Hybrid Cryptosystem of Spritz Symmetric Algorithm and RSA Dual Modulus Algorithm in Digital File Security

Authors

  • Sarwedi Harahap Universitas Potensi Utama, Medan Author
  • Budi Triandi Universitas Potensi Utama, Medan Author
  • Dedy Hartama Sekolah Tinggi Tunas Bangsa, Pematang Siantar Author

DOI:

https://doi.org/10.30743/7tcm0n24

Keywords:

Cryptography; Hybrid; Dual Modulus RSA; Python

Abstract

Amid the rapid development of the digital era, data protection has become very important for individuals and organizations. Digital data often contains sensitive and high-value information that needs to be protected from illegal access and cyber threats. Cryptography can be classified into two types based on the keys used, namely symmetric cryptography and asymmetric cryptography.  Spritz is an asymmetric stream cipher algorithm with encryption and decryption speed but only guarantees the security of keys 128 bits long. Dual Modulus RSA is a variant of the RSA algorithm that offers a higher level of protection compared to Spritz because of the difficulty of factoring large prime numbers during key generation. Still, the Dual Modulus RSA algorithm requires a long time in the process of encrypting and decrypting messages. So this research offers a hybrid cryptography system where the spritz algorithm is used for the message encryption process and the spritz key that is generated is encrypted using a Dual modulus RSA public key so that the key used has double security where the key generated is bigger and more random than the key previous spritz. The Dual Modulus RSA algorithm is used to decrypt the cipher key which will then produce a key spritz. This research shows that using a hybrid cryptography system can prevent the possibility of data theft because the keys used are double-secured and the encryption process is relatively faster.

References

D. Sarumaha, M. Mardiah, S. Amir, A. Gafur, and I. Zega, “Penerapan Algoritma Enhanced Dual Rivest Shamir Adleman untuk Pengamanan Data,” Digital Transformation Technology, vol. 4, no. 1, pp. 34–41, Mar. 2024, doi: 10.47709/digitech.v4i1.3686.

S. M. Naser, “CRYPTOGRAPHY: FROM THE ANCIENT HISTORY TO NOW, IT’S APPLICATIONS AND A NEW COMPLETE NUMERICAL MODEL,” 2021. [Online]. Available: www.ea-journals.org

D. Kumar Sharma, N. Chidananda Singh, D. A. Noola, A. Nirmal Doss, and J. Sivakumar, “A review on various cryptographic techniques & algorithms,” in Materials Today: Proceedings, Elsevier Ltd, 2021, pp. 104–109. doi: 10.1016/j.matpr.2021.04.583.

Z. Arif and A. Nurokhman, “Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi Comparative Analysis of Symmetric and Asymmetric Cryptographic Algorithms in Improving Information System Security,” 2023.

U. Makhsud, “Asymmetric Cryptosystems.” [Online]. Available: www.ijeais.org/ijaer

D. Liestyowati, “Public Key Cryptography,” in Journal of Physics: Conference Series, Institute of Physics Publishing, 2020. doi: 10.1088/1742-6596/1477/5/052062.

H. Abroshan, “A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms.” [Online]. Available: www.ijacsa.thesai.org

B. Halak, Y. Yilmaz, and D. Shiu, “Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications,” IEEE Access, vol. 10, pp. 76707–76719, 2022, doi: 10.1109/ACCESS.2022.3192970.

X. Dong, D. A. Randolph, and S. K. Rajanna, “Enabling Privacy Preserving Record Linkage Systems Using Asymmetric Key Cryptography.”

M. Furqan, R. Kurniawan, A. Halim Hasugian3, I. Zaki, and H. Nst, “http://infor.seaninstitute.org/index.php/infokum/index INFOKUM is licensed under a Creative Commons Attribution-Non Commercial 4.0 International License (CC BY-NC 4.0) Digital Image Security System Using Spritz Algorithm,” JURNAL INFOKUM, vol. 10, no. 1, 2021, [Online]. Available: http://infor.seaninstitute.org/index.php/infokum/index

D. Yusvika Yusdartono and H. Muharry Yusdartono, “Instal : Jurnal Komputer The Combination of the Spritz Algorithm and the Bit Plane Complexity Segmentation Technique in Text Security.” [Online]. Available: https://journalinstal.cattleyadf.org/index.php/Instal/index

T. Signor et al., “Euclid: Identifying the reddest high-redshift galaxies in the Euclid Deep Fields with gradient-boosted trees,” Astron Astrophys, vol. 685, May 2024, doi: 10.1051/0004-6361/202348737.

G. A. Zimbele and S. A. Demilew, “Hidden Real Modulus RSA Cryptosystem,” International Journal of Computing, vol. 22, no. 2, pp. 238–247, 2023, doi: 10.47839/ijc.22.2.3094.

A. Datumaya, W. Sumari, I. Annurroni, and A. Ayuningtyas, “The Internet-of-Things-based Fishpond Security System Using NodeMCU ESP32-CAM Microcontroller,” vol. 10, no. 1, pp. 51–61, 2025, doi: 10.29207/resti.v9i1.6033.

I. Hidayati, M. A. Budiman, and M. Zarlis, “Analysis of Embedding Locations in the Subband Frequency DCT on Scanned Images,” Data Science: Journal of Computing and Applied Informatics, vol. 7, no. 1, pp. 1–14, Jan. 2023, doi: 10.32734/jocai.v7.i1-10359.

D. Sarumaha, M. A. Budiman, and M. Zarlis, “Analysis of Embedding Locations in the Subband Frequency DCT on Scanned Images,” Data Science: Journal of Computing and Applied Informatics, vol. 7, no. 1, pp. 1–14, Jan. 2023, doi: 10.32734/jocai.v7.i1-10359.

Downloads

Published

2024-12-16

Issue

Section

Articles